IJISA Vol. 17, No. 2, 8 Apr. 2025
Cover page and Table of Contents: PDF (size: 1104KB)
PDF (1104KB), PP.14-30
Views: 0 Downloads: 0
Supply Chain, Fraud Detection, Deep Learning, Oversampling, Principal Component Analysis, Security
Supply chain fraud, a persistent issue over the decades, has seen a significant rise in both prevalence and sophistication in recent years. In the current landscape of supply chain management, the increasing complexity of fraudulent activities demands the use of advanced analytical tools. Despite numerous studies in this domain, many have fallen short in exploring the full extent of recent developments. Thus, this paper introduces an innovative deep learning-based classification model specifically designed for fraud detection in supply chain analytics. To enhance the model's performance, hyperparameters are fine-tuned using Bayesian optimization techniques. To manage the challenges posed by high-dimensional data, Principal Component Analysis (PCA) is applied to streamline data dimensions. In order to address class imbalance, the SMOTE technique has been employed for oversampling the minority class of the dataset. The model's robustness is validated through evaluation on the well-established 'DataCo smart supply chain for big data analysis' dataset, yielding impressive results. The proposed approach achieves a 94.71% fraud detection rate and an overall accuracy of 99.42%. Comparative analysis with various other models highlights the significant improvements in fraud transaction detection achieved by this approach. While the model demonstrates high accuracy, it may not be directly transferable to more diverse or real-world datasets. As part of future work, the model can be tested on more varied datasets and refined to enhance generalizability, better aligning it with real-world scenarios. This will include addressing potential overfitting to the specific dataset used and ensuring further validation across different environments to confirm the model's robustness and generalizability.
Kowshik Sankar Roy, Pritom Biswas Udas, Bashirul Alam, Koushik Paul, "Unveiling Hidden Patterns: A Deep Learning Framework Utilizing PCA for Fraudulent Scheme Detection in Supply Chain Analytics", International Journal of Intelligent Systems and Applications(IJISA), Vol.17, No.2, pp.14-30, 2025. DOI:10.5815/ijisa.2025.02.02
[1]Abdallah, M. A. Maarof, and A. Zainal, “Fraud detection system: A survey,” Journal of Network and Computer Applications, vol. 68, pp. 90–113, Jun. 2016, doi: 10.1016/j.jnca.2016.04.007.
[2]S. Aziz and M. Dowling, “Machine Learning and AI for Risk Management,” in Palgrave studies in digital business & enabling technologies, 2018, pp. 33–50. doi: 10.1007/978-3-030-02330-0_3.
[3]M. E. Edge and P. R. F. Sampaio, “The design of FFML: A rule-based policy modelling language for proactive fraud management in financial data streams,” Expert Systems With Applications, vol. 39, no. 11, pp. 9966–9985, Sep. 2012, doi: 10.1016/j.eswa.2012.01.143.
[4]G. Pradeep, V. Ravi, K. Nandan, B. L. Deekshatulu, I. Bose, and A. Aditya, “Fraud Detection in Financial Statements Using Evolutionary Computation Based Rule Miners,” in Lecture notes in computer science, 2015, pp. 239–250. doi: 10.1007/978-3-319-20294-5_21.
[5]V. Vatsa, S. Sural, and A. K. Majumdar, “A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection,” International Journal of Information Security and Privacy, vol. 1, no. 3, pp. 26–46, Jul. 2007, doi: 10.4018/jisp.2007070103.
[6]J. Yan, X. Li, Y. Shi, S. Sun, and H. Wang, “The effect of intention analysis-based fraud detection systems in repeated supply Chain quality inspection: A context of learning and contract,” Information & Management, vol. 57, no. 3, p. 103177, Apr. 2020, doi: 10.1016/j.im.2019.103177.
[7]T. Amarasinghe, A. Aponso, and N. Krishnarajah, “Critical Analysis of Machine Learning Based Approaches for Fraud Detection in Financial Transactions,” May 2018, doi: 10.1145/3231884.3231894.
[8]H. Zhou et al., “A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain,” Computers, Materials & Continua/Computers, Materials & Continua (Print), vol. 64, no. 2, pp. 1091–1105, Jan. 2020, doi: 10.32604/cmc.2020.09834.
[9]G. Baryannis, S. Dani, and G. Antoniou, “Predicting supply chain risks using machine learning: The trade-off between performance and interpretability,” Future Generation Computer Systems, vol. 101, pp. 993–1004, Dec. 2019, doi: 10.1016/j.future.2019.07.059.
[10]F.-V. Constante-Nicolalde, P. Guerra-Terán, and J.-L. Pérez-Medina, “Fraud Prediction in Smart Supply Chains Using Machine Learning Techniques,” in Communications in computer and information science, 2020, pp. 145–159. doi: 10.1007/978-3-030-42520-3_12.
[11]D. Mao, F. Wang, Z. Hao, and H. Li, “Credit Evaluation System Based on Blockchain for Multiple Stakeholders in the Food Supply Chain,” International Journal of Environmental Research and Public Health, vol. 15, no. 8, p. 1627, Aug. 2018, doi: 10.3390/ijerph15081627.
[12]Maurya, A. Kumar, and S. Prakash, “Credit Card Fraud Detection using XGBoost Classifier with a Threshold Value,” Research Square (Research Square), Jun. 2022, doi: 10.21203/rs.3.rs-1722294/v1.
[13]J. Forough and S. Momtazi, “Ensemble of deep sequential models for credit card fraud detection,” Applied Soft Computing, vol. 99, p. 106883, Feb. 2021, doi: 10.1016/j.asoc.2020.106883.
[14]J. Gao, W. Sun, and X. Sui, “Research on Default Prediction for Credit Card Users Based on XGBoost-LSTM Model,” Discrete Dynamics in Nature and Society, vol. 2021, pp. 1–13, Dec. 2021, doi: 10.1155/2021/5080472.
[15]J. Gao, Z. Zhou, J. Ai, B. Xia, and S. Coggeshall, “Predicting Credit Card Transaction Fraud Using Machine Learning Algorithms,” Journal of Intelligent Learning Systems and Applications, vol. 11, no. 03, pp. 33–63, Jan. 2019, doi: 10.4236/jilsa.2019.113003.
[16]M. Cecchini, H. Aytug, G. J. Koehler, and P. Pathak, “Detecting Management Fraud in Public Companies,” Management Science, vol. 56, no. 7, pp. 1146–1160, Jul. 2010, doi: 10.1287/mnsc.1100.1174.
[17]H. Abouloifa and M. Bahaj, “Fraud Detection in Supply Chain 4.0: A Machine Learning Model,” in Lecture notes in networks and systems, 2023, pp. 200–206. doi: 10.1007/978-3-031-35245-4_19.
[18]D. Varmedja, M. Karanovic, S. Sladojevic, M. Arsenovic, and A. Anderla, “Credit Card Fraud Detection - Machine Learning methods,” Mar. 2019, doi: 10.1109/infoteh.2019.8717766.
[19]Y. Dong, K. Xie, Z. Bohan, and L. Lin, “A Machine Learning Model for Product Fraud Detection Based On SVM,” 2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM), Jan. 2021, doi: 10.1109/icekim52309.2021.00091.
[20]H. D. Nguyen, K. P. Tran, S. Thomassey, and M. Hamad, “Forecasting and Anomaly Detection approaches using LSTM and LSTM Autoencoder techniques with the applications in supply chain management,” International Journal of Information Management, vol. 57, p. 102282, Apr. 2021, doi: 10.1016/j.ijinfomgt.2020.102282.
[21]F. Wan, “XGBoost Based Supply Chain Fraud Detection Model,” Mar. 2021, doi: 10.1109/icbaie52039.2021.9390041.
[22]F. Constante, F. Silva, and A. Pereira, “DataCo SMART SUPPLY CHAIN FOR BIG DATA ANALYSIS,” Mar. 12, 2019, doi: 10.17632/8gx2fvg2k6.5
[23]P. B. Udas, Md. E. Karim, and K. S. Roy, “SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 10, pp. 10246–10272, Nov. 2022, doi: 10.1016/j.jksuci.2022.10.019.
[24]K. S. Roy, Md. E. Karim, and P. B. Udas, “Exploiting Deep Learning Based Classification Model for Detecting Fraudulent Schemes over Ethereum Blockchain,” Dec. 2022, doi: 10.1109/sti56238.2022.10103259.
[25]P. B. Udas, K. S. Roy, Md. E. Karim, and S. M. A. Ullah, “Attention-based RNN architecture for detecting multi-step cyber-attack using PSO metaheuristic,” Feb. 2023, doi: 10.1109/ecce57851.2023.10101590.
[26]K. S. Roy, T. Ahmed, P. B. Udas, Md. E. Karim, and S. Majumdar, “MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis,” Intelligent Systems With Applications, vol. 20, p. 200283, Nov. 2023, doi: 10.1016/j.iswa.2023.200283.
[27]K. S. Roy and S. Md. R. Islam, “An RNN-based Hybrid Model for Classification of Electrooculogram Signal for HCI,” International Journal of Computing, pp. 335–344, Oct. 2023, doi: 10.47839/ijc.22.3.3228.
[28]M. Lokanan and V. Maddhesia, “Supply Chain Fraud Prediction with Machine Learning and Artificial intelligence,” Research Square (Research Square), Sep. 2022, doi: 10.21203/rs.3.rs-1996324/v1.